Breaking Grain-128 with Dynamic Cube Attacks

被引:0
|
作者
Dinur, Itai [1 ]
Shamir, Adi [1 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci, IL-76100 Rehovot, Israel
来源
关键词
Cryptanalysis; stream ciphers; Grain-128; cube attacks; cube testers; dynamic cube attacks; IV STATISTICAL-ANALYSIS; KEY RECOVERY ATTACKS; DIFFERENTIAL CRYPTANALYSIS; STREAM CIPHERS; CRYPTOSYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present a new variant of cube attacks called a dynamic cube attack. Whereas standard cube attacks [4] find the key by solving a system of linear equations in the key bits, the new attack recovers the secret key by exploiting distinguishers obtained from cube testers. Dynamic cube attacks can create lower degree representations of the given cipher, which makes it possible to attack schemes that resist all previously known attacks. In this paper we concentrate on the well-known stream cipher Grain-128 [6], on which the best known key recovery attack [15] can recover only 2 key bits when the number of initialization rounds is decreased from 256 to 213. Our first attack runs in practical time complexity and recovers the full 128-bit key when the number of initialization rounds in Grain-128 is reduced to 207. Our second attack breaks a Grain-128 variant with 250 initialization rounds and is faster than exhaustive search by a factor of about 2(28). Finally, we present an attack on the full version of Grain-128 which can recover the full key but only when it belongs to a large subset of 2(-10) of the possible keys. This attack is faster than exhaustive search over the 2(118) possible keys by a factor of about 2(15). All of our key recovery attacks are the best known so far, and their correctness was experimentally verified rather than extrapolated from smaller variants of the cipher. This is the first time that a cube attack was shown to be effective against the full version of a well known cipher which resisted all previous attacks.
引用
收藏
页码:167 / 187
页数:21
相关论文
共 50 条
  • [41] Enhanced Side-Channel Cube Attacks on PRESENT
    Zhao, Xinjie
    Guo, Shize
    Zhang, Fan
    Wang, Tao
    Shi, Zhijie
    Luo, Hao
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 332 - 339
  • [42] Cube attacks on round-reduced MORUS and GimLi
    Siwei CHEN
    Zejun XIANG
    Xiangyong ZENG
    Shasha ZHANG
    Science China(Information Sciences), 2022, 65 (01) : 265 - 267
  • [43] Applying cube attacks to stream ciphers in realistic scenarios
    Dinur, Itai
    Shamir, Adi
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (3-4): : 217 - 232
  • [44] Applying cube attacks to stream ciphers in realistic scenarios
    Itai Dinur
    Adi Shamir
    Cryptography and Communications, 2012, 4 : 217 - 232
  • [45] Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
    Ye, Chen-Dong
    Tian, Tian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (03) : 81 - 102
  • [46] A Modified McCumber Cube as a Basis for a Taxonomy of Cyber Attacks
    Easttom, Chuck
    Butler, William
    2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 943 - 949
  • [47] Cube attacks on round-reduced MORUS and GIMLI
    Chen, Siwei
    Xiang, Zejun
    Zeng, Xiangyong
    Zhang, Shasha
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (01)
  • [48] A dynamic cube atom model
    Hadelung, E
    Lande, A
    ZEITSCHRIFT FUR PHYSIK, 1920, 2 : 230 - 235
  • [49] FuLeakage: Breaking FuLeeca by Learning Attacks
    Hoermann, Felicitas
    van Woerden, Wessel
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT VI, 2024, 14925 : 253 - 286
  • [50] Security Bound of Biclique Attacks on AES-128
    Dong, Xiaoli
    Chen, Jie
    International Journal of Network Security, 2021, 23 (02) : 286 - 295